Digital Forensics Case Study Essay
The fast dissemination of electronic data has aided society’s growing dependence on technology while fueling the desire for improved connection (increasing productivity, efficiency, and availability, to name a few). The increasing integration of smart apps and the digitalization of all parts of our lives is the previous decade’s legacy. As more technologies are deployed, it is becoming increasingly vital to safeguard these technologies and the vast amounts of electronic data they create. Almost every new technology made today is built as a smart gadget that creates data as a side effect, from houses and vehicles to refrigerators, toys, and stoves. These devices are now part of the Internet of Things (IoT), which incorporates sensors, network operations, and data-generating capabilities. Not only has the use of IoT devices grown substantially in recent years but so has the way businesses employ these technologies to offer goods and services Nadeem et al., (2020). Banking, commerce, and search engines are all examples. These high-value-added technologies give the potential for misuse and raise the possibility of criminal activity by using digital information produced for evil intentions. Because this data ranges from sensitive personal data, demographics, and business data to system data and context data, which criminals can monetize, it’s critical to keep it safe. Cybercrime investigations have been more difficult by distributed computers, diverse legal standards, and cross-border data exchange Bello & Griffiths (2021). This does not rule out the prospect of improving law enforcement response times by utilising data and digital proof from the IoT network. Investigations and “forensic investigations” provided limited assistance in terms of security and privacy. Criminals were dealt with by the competent authorities in the government, as well as defence systems. This essay examines the issue and considers how Internet of Things (IoT) technology can assist in improving public safety and security in the long run.
Keywords: Cybercrime, Investigations, Criminal, Internet, Technology, Digital devices, Data
Bello, M., & Griffiths, M. (2021). Routine activity theory and cybercrime investigation in Nigeria: how capable are law enforcement agencies?. In Rethinking Cybercrime (pp. 213-235). Palgrave Macmillan, Cham.https://link.springer.com/chapter/10.1007/978-3-030-55841-3_11
Nadeem, K., Saeed, N., & Ahmed, N. (2020). A Comparative Study of Digital Forensics and Cybercrime Investigation.http://erjsciences.info/wp-content/uploads/2020/12/14.-Digital-Forensic.pdf